{"id":42783,"date":"2021-12-03T15:10:43","date_gmt":"2021-12-03T07:10:43","guid":{"rendered":"https:\/\/version-2.com\/?p=42783"},"modified":"2022-02-07T15:50:59","modified_gmt":"2022-02-07T07:50:59","slug":"absolutely-no-one-is-safe-from-security-attacks","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/","title":{"rendered":"Absolutely no one is safe from security attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42783\" class=\"elementor elementor-42783\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2021\/12\/Ciberatack-blog@72x-100-1.jpg\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p><p><style>\n.post-content h2{ font-size:24px; font-weight:600;}<br \/>\n.post-content h3{ font-size:20px; font-weight:600;}<\/p>\n<\/style><\/p><p><span style=\"font-weight: 400;\">Software developers and manufacturers around the world are under attack by cybercriminals. It is not like we are in a time of the year in which they spread more and they barricade themselves in front of the offices, with their evil laptops seeking to blow everything up, no. They are actually always there, trying to violate <strong>information security<\/strong>, and in this article we are going to give you a little advice on the subject. <\/span><\/p><h2><b>No one is safe from all threats<\/b><\/h2><p><span style=\"font-weight: 400;\">Whether it is a middling attack or sophisticated and destructive (as it happened to our competitors<\/span><a href=\"https:\/\/whatis.techtarget.com\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">Solarwinds<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/pandorafms.com\/blog\/kaseya\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">Kaseya<\/span><\/a><span style=\"font-weight: 400;\">) evil never rests. The whole industry faces an increasingly infuriating threat landscape. Almost every day we wake up with some news of an unforeseen cyber attack that brings with it the consequent wave of urgent and necessary updates so that our system is safe\u2026 Nobody is spared, real giants have fallen over. The complexity of the current software ecosystem means that a vulnerability in a small library affects hundreds of applications. It happened in the past (openssh,<\/span><a href=\"https:\/\/www.openssl.org\/news\/vulnerabilities.html\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">openssl<\/span><\/a><span style=\"font-weight: 400;\">, zlib, glibc\u2026) and it will continue to happen.<\/span><\/p><p><span style=\"font-weight: 400;\">As we pointed out, these attacks can be very sophisticated or they can be the result of a combination of third-party weaknesses that make the client vulnerable, not because of the software, but because of some of the components in its environment. That\u2019s why IT professionals should demand that their software vendors take security seriously, both from an engineering standpoint and from vulnerability management.<\/span><\/p><p><span style=\"font-weight: 400;\">We repeat: <\/span><b>No one is safe from all threats.<\/b><span style=\"font-weight: 400;\"> The software vendor that took others out of business yesterday may very likely be tomorrow\u2019s new victim. Yes, the other day it was Kaseya, tomorrow it could be us. No matter what we do, there is no 100% security, no one can guarantee it. The question is not to prevent something bad from happening, the question is how to manage that situation and get out of it.<\/span><\/p><h2><b>Pandora FMS and ISM ISO 27001<\/b><\/h2><p><span style=\"font-weight: 400;\">Any software vendor can be attacked and each vendor must take the necessary additional measures to protect itself and its users. Pandora FMS encourages our current and future clients to ask their suppliers for more consideration in this matter. We include ourselves.<\/span><\/p><p><span style=\"font-weight: 400;\">Pandora FMS has always taken security very seriously, so much so that for years we have had a public policy of \u201c<\/span><a href=\"https:\/\/pandorafms.com\/community\/security-disclosure-policy\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Vulnerability disclosure policy<\/span><\/a><span style=\"font-weight: 400;\">\u201d and Artica PFMS as a company, is certified with the <\/span><b>ISO 27001<\/b><span style=\"font-weight: 400;\">. We periodically employ code audit tools and maintain some modified versions of common libraries locally.<\/span><\/p><p><span style=\"font-weight: 400;\">In 2021, in face of the security demand, we decided to go one step further, and make ourselves<\/span><a href=\"https:\/\/pandorafms.com\/blog\/what-is-a-cve\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">CNA<\/span> <\/a><span style=\"font-weight: 400;\">of<\/span><a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">CVE<\/span><\/a><span style=\"font-weight: 400;\">, to give a much more direct response to software vulnerabilities reported by independent auditors.<\/span><\/p><h2><b>Decalogue of PFMS for better information security<\/b><\/h2><p><span style=\"font-weight: 400;\">When a client asks us whether Pandora FMS is safe, sometimes we remind them of all this information, but it is not enough. Therefore, today we want to go further and prepare a <\/span><b>decalogue of revealing questions<\/b><span style=\"font-weight: 400;\"> on the subject. Because some software developers take security a little more seriously than others. Relax, these questions and their corresponding answers are valid for both Microsoft and Frank\u2019s Software or whatever thing you may have. Since security does not distinguish between big, small, shy or marketing experts.<\/span><\/p><h3><b>Is there a specific space for security within your software life cycle?<\/b><\/h3><p><span style=\"font-weight: 400;\">At Pandora FMS, we have an AGILE philosophy with sprints (releases) every four weeks, and we have a specific category for security tickets. These have a different priority, a different validation cycle (QA) and of course, a totally different management, since they involve external actors in some cases (through CVE).<\/span><\/p><h3><b>Is your CICD and code versioning system located in a safe environment and do you have specific security measures to ensure it?<\/b><\/h3><p><span style=\"font-weight: 400;\">We use Gitlab internally, on a server in our physical offices in Madrid. People with name and surname, and unique username and password have access to it. No matter what country they are in, their access through VPN is individually controlled and this server cannot be accessed any other way. Our office is protected by a biometric access system and the server room with a key that only two people have.<\/span><\/p><h3><b>Does the developer have an ISMS? (Security Incident Management System)<\/b><\/h3><p><span style=\"font-weight: 400;\">Artica PFMS, the company behind Pandora FMS, is certified with ISO 27001 almost from its beginnings. Our first certification was in 2009. ISO 27001 certifies that there is an ISMS as such in the organization.<\/span><\/p><h3><b>Does the developer have a contingency plan?<\/b><\/h3><p><span style=\"font-weight: 400;\">We not only have one, we have had to use it several times. With COVID, we went from 40 people working in an office in Gran Via (Madrid) to each and everyone of them working at home. We had power outages (for weeks), server fires and many other incidents that put us to the test.<\/span><\/p><h3><b>Does the developer company have a security incident communication plan that includes its customers?<\/b><\/h3><p><span style=\"font-weight: 400;\">It has not happened many times, but we have had to release an urgent security patch, and we have notified our clients in a timely manner.<\/span><\/p><h3><b>Is there an atomic and nominal traceability on code changes?<\/b><\/h3><p><span style=\"font-weight: 400;\">The good thing about code repositories, like GIT, is that these kinds of issues have been solved for a long time. It is impossible to develop software professionally today if tools like GIT are not fully integrated into the organization, and not only into the development team, but also into the QA, support, engineering\u2026 teams.<\/span><\/p><h3><b>Do you have a reliable update distribution system with digital certifications?<\/b><\/h3><p><span style=\"font-weight: 400;\">Our update system (Update Manager) distributes packages with digital certificates. It is a private system, duly secured and with its own technology.\u00a0 <\/span><\/p><h3><b>Do you have an open public vulnerability disclosure policy?<\/b><\/h3><p><span style=\"font-weight: 400;\">In our case, it is published on our<\/span><a href=\"https:\/\/pandorafms.com\/community\/security-disclosure-policy\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\"> website<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p><h3><b>Do you have an Open Source policy that allows the customer to see and audit the application code if necessary?<\/b><\/h3><p><span style=\"font-weight: 400;\">Our code is open, anyone can review it at<\/span><a href=\"https:\/\/github.com\/pandorafms\/pandorafms\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">https:\/\/github.com\/pandorafms\/pandorafms<\/span><\/a><span style=\"font-weight: 400;\">. In addition, some of our customers ask us to audit the source code of the Enterprise version and we are delighted to be able to do so.<\/span><\/p><h3><b>Do the components\/third-party purchases meet the same standards as the rest of the parts of the application?<\/b><\/h3><p><span style=\"font-weight: 400;\">Yes they do, and when they do not comply, we maintain them ourselves.<\/span><\/p><h3><b>BONUS TRACK:<\/b><\/h3><h3><b>Does the company have any ISO Quality certification?<\/b><\/h3><p><span style=\"font-weight: 400;\">ISO 27001\u00a0<\/span><\/p><h3><b>Does the company have any specific safety certification?<\/b><\/h3><p><span style=\"font-weight: 400;\">National Security Scheme, basic level.<\/span><\/p><h2><b>Conclusion<\/b><\/h2><p><span style=\"font-weight: 400;\">Pandora FMS is <\/span><b>ready for EVERYTHING!<\/b><span style=\"font-weight: 400;\"> Just kidding, as we have said, everyone in this sector is vulnerable, and of course the questions in this decalogue are elaborated with certain cunning, after all, we had solid and truthful answers prepared in advance for them, however, the real question is: <\/span><b>Do all software vendors have answers to those questions?<\/b><\/p><p><em>Would you like to find out more about what Pandora FMS can offer you? Find out clicking\u00a0here\u00a0. If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in\u00a0<strong>Cloud<\/strong>\u00a0or\u00a0<strong>On-Premise<\/strong>, you choose !!\u00a0<\/em><\/p><p><em>Last but not least, remember that if you have a reduced number of devices to monitor, you may use Pandora FMS OpenSource version. Find more information\u00a0here\u00a0.<\/em><\/p><p><em>Do not hesitate to send your questions.\u00a0<strong>The great team behind Pandora FMS will be happy to assist you!<\/strong>\u00a0And if you want to keep up with all our news and you like IT, release and, of course, monitoring, we are waiting for you in our blog and in our different social networks, from\u00a0Linkedin\u00a0to\u00a0Twitter\u00a0through the unforgettable\u00a0Facebook\u00a0. We even\u00a0have a YouTube channel\u00a0, and with the best storytellers. Ah well, we also have a new\u00a0Instagram channel\u00a0! Follow our account, we still have a long way to go to match that of Billie Eilish.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"38636\" class=\"elementor elementor-38636\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7400e5a2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7400e5a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;58112d0&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-131f5cf2\" data-id=\"131f5cf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1114ae95 elementor-widget elementor-widget-text-editor\" data-id=\"1114ae95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About PandoraFMS<\/strong><br>\nPandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.<br>\nOf course, one of the things that Pandora FMS can control is the hard disks of your computers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Software developers and manufacturers around the world  [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[474,461,61],"tags":[462,475],"class_list":["post-42783","post","type-post","status-publish","format-standard","hentry","category-pandorafms","category-year2021","category-press-release","tag-462","tag-pandorafms"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Absolutely no one is safe from security attacks - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Absolutely no one is safe from security attacks - Version 2\" \/>\n<meta property=\"og:description\" content=\"Software developers and manufacturers around the world [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-03T07:10:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-07T07:50:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2021\/12\/Ciberatack-blog@72x-100-1.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Absolutely no one is safe from security attacks\",\"datePublished\":\"2021-12-03T07:10:43+00:00\",\"dateModified\":\"2022-02-07T07:50:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/\"},\"wordCount\":1321,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Ciberatack-blog@72x-100-1.jpg\",\"keywords\":[\"2021\",\"Pandorafms\"],\"articleSection\":[\"PandoraFMS\",\"2021\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/\",\"name\":\"Absolutely no one is safe from security attacks - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Ciberatack-blog@72x-100-1.jpg\",\"datePublished\":\"2021-12-03T07:10:43+00:00\",\"dateModified\":\"2022-02-07T07:50:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Ciberatack-blog@72x-100-1.jpg\",\"contentUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Ciberatack-blog@72x-100-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/12\\\/absolutely-no-one-is-safe-from-security-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Absolutely no one is safe from security attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Absolutely no one is safe from security attacks - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/","og_locale":"zh_HK","og_type":"article","og_title":"Absolutely no one is safe from security attacks - Version 2","og_description":"Software developers and manufacturers around the world [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/","og_site_name":"Version 2","article_published_time":"2021-12-03T07:10:43+00:00","article_modified_time":"2022-02-07T07:50:59+00:00","og_image":[{"url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2021\/12\/Ciberatack-blog@72x-100-1.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Absolutely no one is safe from security attacks","datePublished":"2021-12-03T07:10:43+00:00","dateModified":"2022-02-07T07:50:59+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/"},"wordCount":1321,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2021\/12\/Ciberatack-blog@72x-100-1.jpg","keywords":["2021","Pandorafms"],"articleSection":["PandoraFMS","2021","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/","url":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/","name":"Absolutely no one is safe from security attacks - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2021\/12\/Ciberatack-blog@72x-100-1.jpg","datePublished":"2021-12-03T07:10:43+00:00","dateModified":"2022-02-07T07:50:59+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/#primaryimage","url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2021\/12\/Ciberatack-blog@72x-100-1.jpg","contentUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2021\/12\/Ciberatack-blog@72x-100-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2021\/12\/absolutely-no-one-is-safe-from-security-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Absolutely no one is safe from security attacks"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-b83","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/42783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=42783"}],"version-history":[{"count":6,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/42783\/revisions"}],"predecessor-version":[{"id":42793,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/42783\/revisions\/42793"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=42783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=42783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=42783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}